D:\Caixueji_\0 核心编程\study_windous核心编程\CTest\Debug\03-Singleton.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3e0f7ddd1eea1e08b683700cb0c484a0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3e0f7ddd1eea1e08b683700cb0c484a0N.exe
Resource
win10v2004-20240709-en
General
-
Target
3e0f7ddd1eea1e08b683700cb0c484a0N.exe
-
Size
37KB
-
MD5
3e0f7ddd1eea1e08b683700cb0c484a0
-
SHA1
0291221aac85baa5dc3daedc86093bde69209120
-
SHA256
8f7c8d18664748fdcc6ca5ea8b365b7cdc9ab442a726081b02ca10529aadba09
-
SHA512
a489bc86ffbae5d1130309037275c706484d884a87b97ac7f7f00d6292fecb68fb8e80c917d76f58527e3e0b4ed7f12ef02f2a5ea02ff237bf787550b352cf17
-
SSDEEP
384:plkO26Nm57VvQDqlPW/sgjoOKv+Y6vOwUbaYs4BVQKGjWcyThF:puEm57VIDkgXKv8FUC4/QKKG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e0f7ddd1eea1e08b683700cb0c484a0N.exe
Files
-
3e0f7ddd1eea1e08b683700cb0c484a0N.exe.exe windows:5 windows x86 arch:x86
8aa4f1292f15a5683622764bcff519ab
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreatePrivateNamespaceW
AddSIDToBoundaryDescriptor
GetLastError
CreateBoundaryDescriptorW
DeleteBoundaryDescriptor
ClosePrivateNamespace
CloseHandle
LocalFree
VirtualQuery
GetModuleFileNameW
GetProcessHeap
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
OpenPrivateNamespaceW
GetModuleHandleW
CreateMutexW
QueryPerformanceCounter
DecodePointer
LoadLibraryW
GetProcAddress
lstrlenA
RaiseException
MultiByteToWideChar
WideCharToMultiByte
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
EncodePointer
FreeLibrary
user32
DialogBoxParamW
SetWindowLongW
GetWindowLongW
LoadIconW
SendMessageW
EndDialog
GetDlgItem
GetWindowTextW
SetWindowTextW
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateWellKnownSid
msvcr100d
_initterm
_crt_debugger_hook
?terminate@@YAXXZ
_controlfp_s
_invoke_watson
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
_wmakepath_s
wcscpy_s
_wsplitpath_s
_CrtDbgReportW
_CrtSetCheckCount
_wcmdln
exit
_cexit
_XcptFilter
_exit
__wgetmainargs
_amsg_exit
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_CRT_RTC_INITW
_vsnwprintf
wcschr
wcslen
vswprintf_s
_initterm_e
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ